Skip to content

Commit 0cf6103

Browse files
authored
fix(metadata): hsp metadata update (#1072)
Signed-off-by: Vishnu Soman <vishnu@accuknox.com>
1 parent 746e969 commit 0cf6103

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

generic/hsp/metadata.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ policyRules:
1212
description:
1313
tldr: Audit execution of critical processes
1414
yaml: critical-processes.yaml
15-
- name: crypto-jacking-protection
15+
- name: cryptojacking-protection
1616
precondition:
1717
- OPTSCAN
1818
description:
@@ -22,7 +22,7 @@ policyRules:
2222
- https://attack.mitre.org/techniques/T1496/
2323
tldr: Cryptojacking, Crypto mining, Malware protection
2424
detailed: One common purpose for Resource Hijacking is to validate transactions of cryptocurrency networks and earn virtual currency. Adversaries may consume enough system resources to negatively impact and/or cause affected machines to become unresponsive. Servers and cloud-based systems are common targets because of the high potential for available resources.
25-
yaml: crypto-jacking-protection.yaml
25+
yaml: cryptojacking-protection.yaml
2626
- name: defense-control
2727
precondition:
2828
- OPTSCAN
@@ -94,7 +94,7 @@ policyRules:
9494
- OPTSCAN
9595
description:
9696
refs:
97-
- name: Abuse Elevation Control Mechanism: Sudo and Sudo Caching
97+
- name: Abuse Elevation Control Mechanism - Sudo and Sudo Caching
9898
tldr: Audit privilege escalation through use of su/sudo
9999
detailed: On Unix/Linux/macOS systems, adversaries may abuse sudo (superuser do) to run commands as another user, typically root.If they obtain valid credentials, they can run privileged commands directly, exploit sudoers misconfigurations (e.g., NOPASSWD entries) and abuse sudo token caching (the default grace period after entering a password).
100100
yaml: su-access.yaml

0 commit comments

Comments
 (0)